Skip to content

Map backup and scripts folders in docker compose to ease restoring/backing-up of extents #162

Map backup and scripts folders in docker compose to ease restoring/backing-up of extents

Map backup and scripts folders in docker compose to ease restoring/backing-up of extents #162

Triggered via pull request December 16, 2024 16:54
Status Success
Total duration 1m 36s
Artifacts 4

docker-build.yml

on: pull_request
Matrix: Build and Publish Docker images
Fit to window
Zoom out
Zoom in

Annotations

7 warnings
Build and Publish Docker images (3.7.1.1)
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L109
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_SYSTEM_USER_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L108
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_DATA_CURATOR_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L108
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_DATA_CURATOR_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L109
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_SYSTEM_USER_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L109
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_SYSTEM_USER_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: source/Dockerfile#L108
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "GS64_DATA_CURATOR_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size
ba-st~Docker-GemStone-64~52KK6T.dockerbuild
41.5 KB
ba-st~Docker-GemStone-64~L7SOV5.dockerbuild
35.2 KB
ba-st~Docker-GemStone-64~WOHMBN.dockerbuild
24.9 KB
ba-st~Docker-GemStone-64~Z56I37.dockerbuild
25 KB